Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Symantec Analyst Relations
Showing posts in English
Sian John | 02 May 2013 | 0 comments

A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of birth. In this day and age, with personal details proliferating across the Web, it’s not hard to imagine how to get hold of either. 

The shame, perhaps, for Apple, is that the company was in the middle of implementing two-factor authentication for its mobile devices. To add insult to injury the registration process was three days, leaving anyone concerned about the security hole vulnerable to attack. 

On the upside, the breach has now been closed – it is no longer so easy to hack an Apple Id. However the situation does paint a stark picture of the state of play today, which brings together a...

Symantec Analyst Relations | 24 Apr 2013 | 0 comments

2013 Internet Security Threat Report, Volume 18

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

Key Findings

  • 42% increase in targeted attacks in 2012.
  • 31% of all targeted attacks aimed at businesses with less than 250 employees.
  • One waterhole attack infected 500 organizations in a single day.
  • 14 zero-day vulnerabilities.
  • 32% of all mobile threats steal information.
  • A single threat infected 600,000 Macs in 2012.
  • Spam volume continued to decrease, with 69% of all email being spam.
  • The number of phishing sites spoofing social networking sites increased 125%.
  • Web-based attacks increased 30%.
  • 5,291 new...
Jon C | 13 Apr 2013 | 0 comments

A couple of weeks ago, Google announced it would be canning its Google Reader service. Not a particularly strategic tool you might think - it simply enabled users to collate and organise feeds from news, blog and other content sites.

For those still using the product however, this is a problem. Google Reader offers a window onto the world of web content, and its removal is tantamount to walking into someone's house and removing their TV set. Or the calendar from the wall. Or, in the corporate environment, a library shelf full of books and newspapers. You get the picture.

Plenty of Google Reader users exist - as illustrated by the Change.org petition (LINK: http://www.change.org/petitions/google-keep-google...) which is currently running at nearly 150,000 responses. Clearly, if anyone thought that...

D Thomson | 26 Mar 2013 | 0 comments

 

Sometimes when we stop and think about how the world is changing, we realise that it already has.

From Symantec’s perspective, as we have learned from our many conversations with customers large and small, nowhere is this more apparent than in IT service delivery.
 
Delivering IT services was never simple, but at least it was linear. Traditional IT departments follow a command-and-control approach: strategy, procurement and related decisions have been made centrally and delivered out to business departments. This model is changing however, driven by factors coming across from business departments and up from the individuals that staff them.
 
Business divisions are unquestionably taking more control over the technologies they depend upon. What we used to know as “shadow IT” – procurements taking place without the knowledge of IT – is emerging from the gloom ...

Symantec Analyst Relations | 18 Mar 2013 | 0 comments

The February edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through February 2013.

Report highlights

  • Spam – 65.9 percent (an increase of 1.8 percentage points since January)
  • Phishing – One in 466.3 emails identified as phishing (an increase of 0.018 percentage points since January)
  • Malware – One in 408.2 emails contained malware (a decrease of 0.11 percentage points since January)
  • Malicious websites – 1,530 websites blocked per day (a decrease of 32.2 percent since January)

Introduction

In the past month we‘ve discovered of the earliest known...

Symantec Analyst Relations | 14 Mar 2013 | 0 comments

by Phil Nash, Director Analyst Relations

As many commentators have pointed out over the years, Symantec has been built on two pillars, responding to the needs of both corporations and consumers. While this model has served us well it has sometimes added complexity. 

Even more importantly however, the world, and therefore the environment within which we work, has changed. The line between consumers and businesses is becoming ever more fuzzy: whether or not companies are giving employees budget for technology purchases, across the board people are using their own equipment, software or online services in the workplace.

The phrase “consumerization of IT” has been coined to describe this phenomenon. Equally however, we’re seeing the IT-ization of consumers. People are generally becoming more tech-savvy and, in parallel, less tolerant of what they see as inadequate technology. In parallel, the resulting loss of control is...

GregDay-SecurityCTO | 08 Mar 2013 | 0 comments

The Internet of Things (IoT) took another step forward, as standardisation body OASIS formed a committee to enable the adoption of Messaging Queue Telemetry Transport (MQTT) for machine to machine (M2M) communications. 

MQTT is a small-footprint messaging protocol designed to enable low-power devices to exchange information. Such standards matter as they accelerate technology creation and adoption, by reducing development costs and increasing interoperability. In layperson's terms, the easier it is for devices to talk to each other, the more they will do it.

IoT is very interesting to us at Symantec, most importantly because it will have a dramatic impact on the way we all use technology. The EU's Neelie Kroes suggested that up to 50 billion devices could be connected to the Internet by 2020, from pallets to fridges. Indeed, the number of '...

D Thomson | 15 Feb 2013 | 0 comments

It’s interesting to me that many IT organisations that I speak to now have started to realise that “infrastructure” may no longer be king.

If I think about the projects and strategies that I was working on 5 or so years ago, almost all project focus (time, effort and money) was directed specifically at IT “plumbing”…. “We need to implement archiving, let’s buy some storage and a bit of software”, “our business is asking for highly available systems, let go build a second datacenter”.

One of my favourite IT books of the past decade and one that many will remember was, “Does IT Matter?” by Nicholas Carr (here). This thought provoking (and seemingly controversial) work discussed the idea that, in all industries, infrastructure...

Neal Watkins | 12 Feb 2013 | 0 comments

Symantec released its  2012 Corporate Social Responsibility (CSR) report at the end of October. It’s not for any company to make the final judgement on how well it rates in terms of CSR, but you can read independent reviews from environmental analysis firm TriplePundit and Ethical Corporation.
 
From the top, the report divides into three sections. Our People, which covers how Symantec develops as an inclusive, diverse organisation; The World, tackling how the company minimises its footprint and maximises its positive social impact; and Your Information, which specifically...

Sian John | 11 Feb 2013 | 0 comments

There is a lot of fear out there when it comes to dealing with the cloud, especially with so much hype surrounding the technology. However, what you do, and do not, commit to the public cloud is entirely your call.

To misquote George Orwell’s classic, ‘Animal Farm’: ‘All clouds are equal – but some are more equal than others’. The other key thing to remember is that not everything is for the cloud, so it’s a matter of each to its rightful place.

Information highly sensitive? Then use private clouds, so that you benefit from scalability and flexibility internally, without exposing your data to the Internet. Consider which are your crown jewels of information and what protection you have around these. Is it good enough? Should those defences be more robust?

The starting point is to look carefully at each workload when deciding which kind of cloud your data should be in. The relative merits of issues such as availability,...